Ausnahme gefangen: SSL certificate problem: certificate is not yet valid ๐Ÿ“Œ USN-2985-1: GNU C Library vulnerabilities

๐Ÿ  Team IT Security News

TSecurity.de ist eine Online-Plattform, die sich auf die Bereitstellung von Informationen,alle 15 Minuten neuste Nachrichten, Bildungsressourcen und Dienstleistungen rund um das Thema IT-Sicherheit spezialisiert hat.
Ob es sich um aktuelle Nachrichten, Fachartikel, Blogbeitrรคge, Webinare, Tutorials, oder Tipps & Tricks handelt, TSecurity.de bietet seinen Nutzern einen umfassenden รœberblick รผber die wichtigsten Aspekte der IT-Sicherheit in einer sich stรคndig verรคndernden digitalen Welt.

16.12.2023 - TIP: Wer den Cookie Consent Banner akzeptiert, kann z.B. von Englisch nach Deutsch รผbersetzen, erst Englisch auswรคhlen dann wieder Deutsch!

Google Android Playstore Download Button fรผr Team IT Security



๐Ÿ“š USN-2985-1: GNU C Library vulnerabilities


๐Ÿ’ก Newskategorie: Unix Server
๐Ÿ”— Quelle: ubuntu.com

Ubuntu Security Notice USN-2985-1

25th May, 2016

eglibc, glibc vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 15.10
  • Ubuntu 14.04 LTS
  • Ubuntu 12.04 LTS

Summary

Several security issues were fixed in the GNU C Library.

Software description

  • eglibc - GNU C Library
  • glibc - GNU C Library

Details

Martin Carpenter discovered that pt_chown in the GNU C Library did not
properly check permissions for tty files. A local attacker could use this
to gain administrative privileges or expose sensitive information.
(CVE-2013-2207, CVE-2016-2856)

Robin Hack discovered that the Name Service Switch (NSS) implementation in
the GNU C Library did not properly manage its file descriptors. An attacker
could use this to cause a denial of service (infinite loop).
(CVE-2014-8121)

Joseph Myers discovered that the GNU C Library did not properly handle long
arguments to functions returning a representation of Not a Number (NaN). An
attacker could use this to cause a denial of service (stack exhaustion
leading to an application crash) or possibly execute arbitrary code.
(CVE-2014-9761)

Arjun Shankar discovered that in certain situations the nss_dns code in the
GNU C Library did not properly account buffer sizes when passed an
unaligned buffer. An attacker could use this to cause a denial of service
or possibly execute arbitrary code. (CVE-2015-1781)

Sumit Bose and Lukas Slebodnik discovered that the Name Service
Switch (NSS) implementation in the GNU C Library did not handle long
lines in the files databases correctly. A local attacker could use
this to cause a denial of service (application crash) or possibly
execute arbitrary code. (CVE-2015-5277)

Adam Nielsen discovered that the strftime function in the GNU C Library did
not properly handle out-of-range argument data. An attacker could use this
to cause a denial of service (application crash) or possibly expose
sensitive information. (CVE-2015-8776)

Hector Marco and Ismael Ripoll discovered that the GNU C Library allowed
the pointer-guarding protection mechanism to be disabled by honoring the
LD_POINTER_GUARD environment variable across privilege boundaries. A local
attacker could use this to exploit an existing vulnerability more easily.
(CVE-2015-8777)

Szabolcs Nagy discovered that the hcreate functions in the GNU C Library
did not properly check its size argument, leading to an integer overflow.
An attacker could use to cause a denial of service (application crash) or
possibly execute arbitrary code. (CVE-2015-8778)

Maksymilian Arciemowicz discovered a stack-based buffer overflow in the
catopen function in the GNU C Library when handling long catalog names. An
attacker could use this to cause a denial of service (application crash) or
possibly execute arbitrary code. (CVE-2015-8779)

Florian Weimer discovered that the getnetbyname implementation in the GNU C
Library did not properly handle long names passed as arguments. An attacker
could use to cause a denial of service (stack exhaustion leading to an
application crash). (CVE-2016-3075)

Update instructions

The problem can be corrected by updating your system to the following package version:

Ubuntu 15.10:
libc6-dev 2.21-0ubuntu4.2
libc6 2.21-0ubuntu4.2
Ubuntu 14.04 LTS:
libc6-dev 2.19-0ubuntu6.8
libc6 2.19-0ubuntu6.8
Ubuntu 12.04 LTS:
libc6-dev 2.15-0ubuntu10.14
libc6 2.15-0ubuntu10.14

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to reboot your computer to
make all the necessary changes.

References

CVE-2013-2207, CVE-2014-8121, CVE-2014-9761, CVE-2015-1781, CVE-2015-5277, CVE-2015-8776, CVE-2015-8777, CVE-2015-8778, CVE-2015-8779, CVE-2016-2856, CVE-2016-3075

...













๐Ÿ“Œ USN-3239-1: GNU C Library vulnerabilities


๐Ÿ“ˆ 26.67 Punkte

๐Ÿ“Œ USN-4954-1: GNU C Library vulnerabilities


๐Ÿ“ˆ 26.67 Punkte

๐Ÿ“Œ USN-5699-1: GNU C Library vulnerabilities


๐Ÿ“ˆ 26.67 Punkte

๐Ÿ“Œ USN-5768-1: GNU C Library vulnerabilities


๐Ÿ“ˆ 26.67 Punkte

๐Ÿ“Œ USN-3534-1: GNU C Library vulnerabilities


๐Ÿ“ˆ 26.67 Punkte

๐Ÿ“Œ USN-6541-1: GNU C Library vulnerabilities


๐Ÿ“ˆ 26.67 Punkte

๐Ÿ“Œ USN-6620-1: GNU C Library vulnerabilities


๐Ÿ“ˆ 26.67 Punkte

๐Ÿ“Œ USN-4416-1: GNU C Library vulnerabilities


๐Ÿ“ˆ 26.67 Punkte

๐Ÿ“Œ USN-2900-1: GNU C Library vulnerability


๐Ÿ“ˆ 21.82 Punkte

๐Ÿ“Œ CVE-2016-4429 | GNU C Library ICMP/UDP Packet sunrpc/clnt_udp.c clntudp_call input validation (USN-3759-1 / Nessus ID 91534)


๐Ÿ“ˆ 21.82 Punkte

๐Ÿ“Œ USN-2900-1: GNU C Library vulnerability


๐Ÿ“ˆ 21.82 Punkte

๐Ÿ“Œ USN-3239-2: GNU C Library Regression


๐Ÿ“ˆ 21.82 Punkte

๐Ÿ“Œ USN-3239-3: GNU C Library regression


๐Ÿ“ˆ 21.82 Punkte

๐Ÿ“Œ USN-3323-1: GNU C Library vulnerability


๐Ÿ“ˆ 21.82 Punkte

๐Ÿ“Œ USN-6472-1: GNU Scientific Library vulnerability


๐Ÿ“ˆ 21.82 Punkte

๐Ÿ“Œ USN-6737-1: GNU C Library vulnerability


๐Ÿ“ˆ 21.82 Punkte

๐Ÿ“Œ USN-3323-2: GNU C Library vulnerability


๐Ÿ“ˆ 21.82 Punkte

๐Ÿ“Œ USN-3536-1: GNU C Library vulnerability


๐Ÿ“ˆ 21.82 Punkte

๐Ÿ“Œ USN-4218-1: GNU C Library vulnerability


๐Ÿ“ˆ 21.82 Punkte

๐Ÿ“Œ USN-6541-2: GNU C Library regression


๐Ÿ“ˆ 21.82 Punkte

๐Ÿ“Œ CVE-2019-19126 | GNU C Library up to 2.30 on x86-64 setuid Program LD_PREFER_MAP_32BIT_EXEC information disclosure (USN-4416-1)


๐Ÿ“ˆ 21.82 Punkte

๐Ÿ“Œ CVE-2020-10029 | GNU C Library up to 2.31 Double Function e_rem_pio2l.c memory corruption (USN-4416-1)


๐Ÿ“ˆ 21.82 Punkte

๐Ÿ“Œ USN-6581-1: GNU binutils vulnerabilities


๐Ÿ“ˆ 18.7 Punkte

๐Ÿ“Œ USN-2906-1: GNU cpio vulnerabilities


๐Ÿ“ˆ 18.7 Punkte

๐Ÿ“Œ USN-2906-1: GNU cpio vulnerabilities


๐Ÿ“ˆ 18.7 Punkte

๐Ÿ“Œ USN-6101-1: GNU binutils vulnerabilities


๐Ÿ“ˆ 18.7 Punkte

๐Ÿ“Œ USN-6544-1: GNU binutils vulnerabilities


๐Ÿ“ˆ 18.7 Punkte

๐Ÿ“Œ USN-4336-1: GNU binutils vulnerabilities


๐Ÿ“ˆ 18.7 Punkte

๐Ÿ“Œ USN-6655-1: GNU binutils vulnerabilities


๐Ÿ“ˆ 18.7 Punkte

๐Ÿ“Œ USN-5494-1: SpiderMonkey JavaScript Library vulnerabilities


๐Ÿ“ˆ 18.47 Punkte

๐Ÿ“Œ USN-2987-1: GD library vulnerabilities


๐Ÿ“ˆ 18.47 Punkte

๐Ÿ“Œ USN-3030-1: GD library vulnerabilities


๐Ÿ“ˆ 18.47 Punkte

๐Ÿ“Œ USN-3060-1: GD library vulnerabilities


๐Ÿ“ˆ 18.47 Punkte

matomo